Results for Threat

Growing CyberSecurity Skills Gap Worries Security Professionals; Highlights Challenges for Staffing

A recent survey on security staff confirms what we all know – IT is growing even more worried that these professionals are so hard to find, hire and keep.  But the survey, commissioned by Tripwire, also found the shortage is prompting companies to their methods for how to protect against cyberattacks. 

Full Story >

Splunk Continues To Expand Its Adaptive Response Initiative To Detect, Battle CyberThreats Faster

As cyber threats become more sophisticated, headline-grabbing security point solutions just can’t handle the speed and complexity of diagnosing and fighting off the attacks.  In response, Splunk continues to recruit vendor partners and domain experts to its Adaptive Response Initiative. IDN looks at the latest additions.

Full Story >

Cool APIs: Top Tips To Secure Valuable APIs Against Growing Security Threats

IDN continues its ‘Cool APIs’ series with a focus on API Security. As APIs become more and more popular, they are also the target of a growing number of cyberthreats. Experts from Axway, Built.io, CA, MuleSoft, Red Hat, SmartBear, discuss top API threats, how to fight them, effective API Security technologies -- and what’s next.

Full Story >

IBM Says Know Your Security Posture: The Key To Incident Response is Understanding Your Risks

Earlier this fall, the Internet was brought to its knees by an army of Internet of Things devices. Given this successful attack on core Internet highways, can any stand-alone company expect to protect itself? How can businesses identify, combat and even predict threats? IDN speaks with IBM Security’s Peter Allor to get suggestions, insights -- and hope.

Full Story >

Deloitte: For CyberSecurity – Offense Can Be the Best Defense

As 2016 begins, organizations are going on the offense to combat cyber threats, according to a report this month by Deloitte LLP.  Companies and government agencies are no longer satisfied with simply "locking the doors" where cybersecurity is concerned, said the 2016 Deloitte Analytics Trends report.

Full Story >

Survey: Ping Identity Finds Employee Behaviors Can Be Big Contributors To Security Risks

A recent survey of 1,000 employees at large U.S. enterprise organizations finds that employee inattentiveness, laziness and possible malicious intent add up to constitute a real cyber security concerns.  The research was commissioned by security vendor Ping Identity.

Full Story >

Guidance Teams with Splunk & Lastline For Faster, Smarter Incident Response

Guidance Software is fortifying its endpoint detection and response with a new release of EnCase Endpoint Security, as well as new partnerships and deep integration with Splunk and Lastline. The goal is to cut time and complexity for threat detection and prevention.

Full Story >

Ravello, SimSpace Use Virtualization To Create True-To-Life CyberSecurity Simulations

Ravello Systems and SimSpace Corp. are partnering on an easy to use cloud-based way to create simulated cyber attacks – and test the effectiveness of defenses, responses – and even IT skills.

Full Story >

LogRhythm Extends Threat Analytics Suite with Endpoint Module

Security intelligence firm LogRhythm is looking to help IT more quickly detect intruders with its latest offering Endpoint Threat Analytics Module. It supplements LogRythm’s current threat analytics modules for network and end user visibility.

Full Story >

Report: Webroot Finds Cybersecurity Threats Grow More Numerous, Complex

Every day, 85,000 new malicious IP addresses are launched, and the top phishing targets are technology companies and financial institutions, according to the new Webroot 2015 Threat Brief.

Full Story >

Survey: Consumers Have Big Concerns Over Security for Mobile Payment Platforms, Apps

Despite innovative mobile payments from giants Apple and Google, a recent survey finds practically everyone is worried about smartphone-based payment security.  Even credit cards weren’t the no-brainer choice, as more than 60% of U.S. respondents said cash is their Number One choice.  IDN looks at the Tripwire survey.

Full Story >

Arbor Networks To Protect Against BYOD, Mobile Vulnerabilities with Deep Analytics, Threat Protection

In the wake of surveys that find 60% of mobile network operators say they have come under attack. Arbor Networks Inc. has launched its Peakflow Mobile Network Analysis to give network service providers better visibility, including advanced threat protection for fixed networks, HSPA/LTE and cloud infrastructures.

Full Story >

<< Start < Previous 1 2 Next > End >>
Showing 1 - 12 of 18

Videos

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

When Bots Attack! Stopping OWASP's New Top 20 Automated Threats



  • Rami Essaid - CEO & Co-founder

HPE Security and CyberEdge Disclose - 2017 Cyberthreat Defense Report Findings



  • Mark Bouchard - COO - CyberEdge Group
  • Sheryl Wharff - Global Product & Channel Marketing - HPE